SlideShare une entreprise Scribd logo
1  sur  37
LOW POWER WIRELESS SENSOR
NETWORK
Shikha yadav
12EJTEC075
ECE, 5th sem
1
CONTENTS
 Introduction
 Definition
 Example of WSN
 Types of WSN
 Characteristics of a
WSN
 Power saving protocols
for WSN
 Applications
 Challenges
 Advantages
 Disadvantages
 Future Scope
 Conclusion 2
INTRODUCTION
3
 Low power wireless sensor Networks are
networks that consists of sensors which are
distributed in an ad hoc manner.
 These sensors work with each other to sense
some physical phenomenon and then the
information gathered is processed to get relevant
results.
 Low power Wireless sensor networks consists of
protocols and algorithms with self-organizing
capabilities.
CONTINUED.........
 Sensor networks are highly distributed networks of small,
lightweight wireless node, deployed in large numbers to
monitor the environment or system.
 Each node of the sensor networks consist of three subsystem:
 Sensor subsystem: senses the environment
 Processing subsystem: performs local computations on the
sensed data
 Communication subsystem: responsible for message exchange
with neighboring sensor nodes
 The features of sensor nodes
 Limited sensing region, processing power, energy
4
5
DEFINITION
Low power Wireless Sensor Networks :
Highly distributed networks of small, lightweight wireless
nodes,
Deployed in large numbers,
Monitors the environment or system by measuring phys
parameters such as temperature, pressure, humidity.
Node:
sensing + processing + communication
6
EXAMPLE OF LPWSN
TYPES OF WIRELESS SENSOR NETWORKS
7
 Dense collection of nodes
 Ad-hoc
deployment
 Difficulty in network
maintenance
 Few and scarcely
distributed nodes
 Pre-planned deployment
 Lower network
maintenance
Unstructured WSN Structured WSN
CHARACTERISTICS OF A LPWSN
1. Self – Organization
2. Concurrency processing
3. Low cost
4. Restricted energy resources
5. Tiny
6. Small radio range 8
9
POWER SAVING PROTOCOLS
THERE ARE SOME PROTOCOLS WHICH IS USED
FOR POWER SAVING……..
 Unified Network Protocol Framework (UNPF)
 Low-Energy Adaptive Clustering Hierarchy
(LEACH)
 MAC PROTOCOL
 NETWORK LAYER
 BATTERY MODEL
and some other…
10
LAYERED ARCHITECTURE
 A single powerful base station
(BS)
 Layers of sensor nodes around
BS
 Layer i: All nodes i-hop away
from BS
 Applications:
 In-building: BS is an access point
 Military
 Short-distance, low power tt tx
11
UNIFIED NETWORK PROTOCOL
FRAMEWORK (UNPF)
 A layered architecture
 A set of protocols
 Integrates three operations:
 Network Initialization & Maintenance Protocol
 MAC Protocol
 Routing Protocol
12
UNIFIED NETWORK PROTOCOL
FRAMEWORK (UNPF)
 Network Initialization & Maintenance Protocol:
 BS broadcasts its ID using CDMA common control channel
(BS reaches all nodes in one hop)
 Nodes record BS ID & send beacon signal with their own
IDs at their low default power levels
 All nodes the BS can hear are at 1-hop distance
 The BS broadcasts a control packet with all layer one node
IDs
 All nodes send a beacon signal again
 The layer one nodes record the IDs they hear-layer 2
 The layer one nodes inform the BS of the layer 2
 The BS broadcasts the layer2 nodes IDs,…
 To maintain: periodic beaconing updates are required
13
POWER SAVING MODE
 Turning the transceiver off may not always be
efficient. Operation in a power-saving mode is
energy-efficient only if the time spent in that mode
is greater than a certain threshold
MULTIPLE HOPS
 Using several short hops may be more energy
efficient than using one large hop.
14
CLUSTERED ARCHITECTURE
 A clustered architecture organizes the sensor nodes into clusters, each
governed by a cluster-head. The nodes in each cluster are involved in
message exchanges with their cluster-heads, and these heads send message
to a BS.
 Clustered architecture is useful for sensor networks because of its inherent
suitability for data fusion. The data gathered by all member of the cluster
can be fused at the cluster-head, and only the resulting information needs to
be communicated to the BS.
 The cluster formation and election of cluster-heads must be an autonomous,
distributed process.
15
CLUSTERED ARCHITECTURE
16
LOW-ENERGY ADAPTIVE CLUSTERING HIERARCHY
(LEACH)
 Self-organizing and adaptive clustering protocol
 Evenly distributes the energy expenditure among
the sensors
 Performs data aggregation where cluster heads
act as aggregation points
 Two main phases:
 Setup phase: organizing the clusters
 Steady-state phase: deals with the actual data
transfers to the BS
17
 Setup phase:
 Each sensor chooses a random number m between 0 and 1
 If m < T(n) for node n, the node becomes a cluster-head where
 P : the desired percentage of cluster heads
 r : the round number
 G : the set of nodes that have not been cluster heads during the last
1 / P rounds
 A cluster head advertises its neighbors using a CSMA MAC.
 Surrounding nodes decide which cluster to join based on the signal
strength of these messages
 Cluster heads assign a TDMA schedule for their members
1 [ * mod(1/ )]( )
0 ,
P
if n G
P r PT n
otherwise


 


18
 Steady-state phase:
 All source nodes send their data to their cluster heads
 Cluster heads perform data aggregation/fusion through
local transmission
 Cluster heads send them back to the BS using a single
direct transmission
 After a certain period of time, cluster heads are selected
again through the set-up phase
19
LOW-ENERGY ADAPTIVE CLUSTERING
HIERARCHY (LEACH)
 Merits:
 Accounting for adaptive clusters and rotating cluster
heads
 Opportunity to implement any aggregation function at
the cluster heads
 Demerits:
 Highly dynamic environments
 Continuous updates
 Mobility
20
MAC PROTOCOL
 During the data transmission phase, the distributed TDMA
receiver oriented channel (DTROC) assignment MAC protocol
is used.
 Two steps of DTROC :
 Channel allocation : Each node is assigned a reception channel
by the BS, and channel reuse is such that collisions are avoided.
 Channel scheduling : The node schedules transmission slots for
all its neighbors and broadcasts the schedule. This enables
collision-free transmission and saves energy, as nodes can turn
off when they are not involved on a send/receive operation.
THERE ARE THREE TYPES OF MAC
PROTOCOLS
 Fixed-allocation
 Demand-based
 Contention-based
21
22
 Fixed-allocation MAC protocol
 Share the common medium through a predetermined assignment.
 It is suitable for sensor network that continuously monitor and
generate deterministic data traffic
 Provide a bounded delay for each node
 However, in the case of bursty traffic, where the channel
requirements of each node may vary over time, it may lead to
inefficient usage of the channel.
23
 Demand-based MAC protocol
 Used in such cases, where the channel is allocated according to
the demand of the node
 Variable rate traffic can be efficiently transmitted
 Require the additional overhead of a reservation process
 Contention-based MAC protocol
 Random-access-based contention for the channel when packets
need to be transmitted
 Suitable for bursty traffic
 Collisions and no delay guarantees, are not suitable for delay-
sensitive or real-time traffic
24
HYBRID TDMA/FDMA
 A pure TDMA scheme minimize the time for which a node has to be
kept on, but the associated time synchronization cost are very high.
 A pure FDMA scheme allots the minimum required bandwidth for
each connection
 If the transmitter consumes more power, a TDMA scheme is favored,
since it can be switch off in idle slots to save power.
 If the receiver consumes greater power, a FDMA scheme is favored,
because the receiver need not expend power for time
synchronization.
NETWORK LAYER
25
APPLICATIONS OF LPWSN
 Area monitoring
 Health care monitoring
 Air pollution monitoring
 Forest fire detection
 Landslide detection
 Water quality monitoring
 Natural disaster prevention
 Industrial monitoring
26
27
 Facility management
 Intrusion detection into industrial sites
 Control of leakages in chemical plants, …
 Machine surveillance and preventive maintenance
 Embed sensing/control functions into places no cable
has gone before
 E.g., tire pressure monitoring
 Precision agriculture
 Bring out fertilizer/pesticides/irrigation only where
needed
 Medicine and health care
 Post-operative or intensive care
 Long-term surveillance of chronically ill patients or the
elderly
CHALLENGES
 Hardware :
1. Low cost
2. Tiny sensors
3. Lifetime maximization
4. Robustness and fault tolerance
5. Self-configuration
 Software :
1. Operating systems
2. Security
3. Mobility
28
ADVANTAGES OF A WSN
 Avoids a lot of wiring
 Can accommodate new devices at any time
 Flexible to go through physical partitions
 It can be accessed through a centralized monitor
 Infrastructure
29
DISADVANTAGES OF WSN
 Easy for hackers to hack a network
 Comparatively low speed of communication
 Gets distracted by various elements
 Costly at large
 Life of nodes
 Energy life 30
FUTURE SCOPE
 More research work needs to be done in future.
 Needs to be implemented in a wireless sensor network
with mobile nodes.
 The effects of very large node densities need to be
investigated.
 The feasibility of using the clustering technique and data
aggregation needs to be tested in the same wireless
sensor network. 31
FUTURE SCOPE
32
33
FUTURE OF WSN
SMART HOME / SMART OFFICE
 Sensors controlling
appliances and
electrical devices in the
house.
 Better lighting and
heating in office
buildings.
 The Pentagon building
has used sensors
extensively.
FUTURE SCOPE
34
Intelligent transport,
industry and society,
smart utilities
Connected
Consumer
Electronics
 Development of a TDMA/CSMA hybrid MAC
 TinyOS currently has a CSMA MAC
 Hope to improve throughput by employing TDMA
 Time is divided into transmission periods and contention perio
 Nodes will contend with each other to join “the transmission
group” during the contention period.
 Nodes in the transmission group will be allocated a time-slot in
the transmission period.
 Development of data storage engine optimized for fast
retrieval
CONCLUSION
This presentation shows all the techniques that are used
for wireless sensor network for low power consumption ,
for example MAC protocol, LEACH, Network layer, ect.
Most of the research on energy efficient controlled
access protocol has come at a cost of control
packets overhead. By investigating this research
area further, an enhanced energy efficiency
protocol may be developed that can revolutionise
WSN’s power consumption.
There are some another protocols which can be used for
less energy consumption like CDMA,FDMA,TDMA.
35
REFERENCES
 www.wikipedia.org
 http://stakeholders.ofcom.org.uk/binaries/research/tec
hnology-research/wsn2.pdf
 http://www.researchgate.net/publication/228695105_S
ervice-
36
37

Contenu connexe

Tendances

SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSjuno susi
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitecturePeriyanayagiS
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A ReviewEditor IJMTER
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Haya Saani
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Raj vardhan
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communicationMuhammad Uzair Rasheed
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
LTE - Long Term Evolution
LTE - Long Term EvolutionLTE - Long Term Evolution
LTE - Long Term EvolutionArief Gunawan
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsAbdullah Alfadhly
 
Concepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellConcepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellKundan Kumar
 

Tendances (20)

SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
Gsm
GsmGsm
Gsm
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Nesc tutorial
Nesc tutorialNesc tutorial
Nesc tutorial
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
LTE - Long Term Evolution
LTE - Long Term EvolutionLTE - Long Term Evolution
LTE - Long Term Evolution
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Concepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellConcepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cell
 

En vedette

Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Duncan Purves
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
Idate digi world 2015 - lora alliance - v(0.2)
Idate   digi world 2015 - lora alliance - v(0.2)Idate   digi world 2015 - lora alliance - v(0.2)
Idate digi world 2015 - lora alliance - v(0.2)Thierry Lestable
 
WeatherXM at IoT Boussias Conference 2015
WeatherXM at IoT Boussias Conference 2015WeatherXM at IoT Boussias Conference 2015
WeatherXM at IoT Boussias Conference 2015Manolis Nikiforakis
 
Ignes lo ra - thierry lestable - 29102015 - vfinal
Ignes   lo ra - thierry lestable - 29102015 - vfinalIgnes   lo ra - thierry lestable - 29102015 - vfinal
Ignes lo ra - thierry lestable - 29102015 - vfinalThierry Lestable
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Understand LPWA tetchnologies (Sigfox and LoRa)
Understand LPWA tetchnologies (Sigfox and LoRa)Understand LPWA tetchnologies (Sigfox and LoRa)
Understand LPWA tetchnologies (Sigfox and LoRa)Robert Vivanco Salcedo
 
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosLPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosPeter R. Egli
 
Low Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of ThingsLow Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of ThingsDuncan Purves
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 

En vedette (19)

Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
The Things Network - Athens
The Things Network - AthensThe Things Network - Athens
The Things Network - Athens
 
Idate digi world 2015 - lora alliance - v(0.2)
Idate   digi world 2015 - lora alliance - v(0.2)Idate   digi world 2015 - lora alliance - v(0.2)
Idate digi world 2015 - lora alliance - v(0.2)
 
WeatherXM at IoT Boussias Conference 2015
WeatherXM at IoT Boussias Conference 2015WeatherXM at IoT Boussias Conference 2015
WeatherXM at IoT Boussias Conference 2015
 
SODAQ_BrochureFinal
SODAQ_BrochureFinalSODAQ_BrochureFinal
SODAQ_BrochureFinal
 
Ignes lo ra - thierry lestable - 29102015 - vfinal
Ignes   lo ra - thierry lestable - 29102015 - vfinalIgnes   lo ra - thierry lestable - 29102015 - vfinal
Ignes lo ra - thierry lestable - 29102015 - vfinal
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Understand LPWA tetchnologies (Sigfox and LoRa)
Understand LPWA tetchnologies (Sigfox and LoRa)Understand LPWA tetchnologies (Sigfox and LoRa)
Understand LPWA tetchnologies (Sigfox and LoRa)
 
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosLPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
 
Low Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of ThingsLow Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of Things
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 

Similaire à Ppt on low power wireless sensor network 5th sem

CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).ppt7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).pptleonalmessibd21
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptxMunazza63
 
WSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptWSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptAbyThomas54
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksJerry Yoakum
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
 
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...Journal For Research
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkijcsa
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyIAEME Publication
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 

Similaire à Ppt on low power wireless sensor network 5th sem (20)

CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).ppt7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).ppt
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
WSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptWSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.ppt
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
A04560105
A04560105A04560105
A04560105
 
WSN
WSNWSN
WSN
 
WSN
WSNWSN
WSN
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
B05630814
B05630814B05630814
B05630814
 

Dernier

Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate productionChinnuNinan
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentBharaniDharan195623
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 

Dernier (20)

Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate production
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managament
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 

Ppt on low power wireless sensor network 5th sem

  • 1. LOW POWER WIRELESS SENSOR NETWORK Shikha yadav 12EJTEC075 ECE, 5th sem 1
  • 2. CONTENTS  Introduction  Definition  Example of WSN  Types of WSN  Characteristics of a WSN  Power saving protocols for WSN  Applications  Challenges  Advantages  Disadvantages  Future Scope  Conclusion 2
  • 3. INTRODUCTION 3  Low power wireless sensor Networks are networks that consists of sensors which are distributed in an ad hoc manner.  These sensors work with each other to sense some physical phenomenon and then the information gathered is processed to get relevant results.  Low power Wireless sensor networks consists of protocols and algorithms with self-organizing capabilities.
  • 4. CONTINUED.........  Sensor networks are highly distributed networks of small, lightweight wireless node, deployed in large numbers to monitor the environment or system.  Each node of the sensor networks consist of three subsystem:  Sensor subsystem: senses the environment  Processing subsystem: performs local computations on the sensed data  Communication subsystem: responsible for message exchange with neighboring sensor nodes  The features of sensor nodes  Limited sensing region, processing power, energy 4
  • 5. 5 DEFINITION Low power Wireless Sensor Networks : Highly distributed networks of small, lightweight wireless nodes, Deployed in large numbers, Monitors the environment or system by measuring phys parameters such as temperature, pressure, humidity. Node: sensing + processing + communication
  • 7. TYPES OF WIRELESS SENSOR NETWORKS 7  Dense collection of nodes  Ad-hoc deployment  Difficulty in network maintenance  Few and scarcely distributed nodes  Pre-planned deployment  Lower network maintenance Unstructured WSN Structured WSN
  • 8. CHARACTERISTICS OF A LPWSN 1. Self – Organization 2. Concurrency processing 3. Low cost 4. Restricted energy resources 5. Tiny 6. Small radio range 8
  • 9. 9 POWER SAVING PROTOCOLS THERE ARE SOME PROTOCOLS WHICH IS USED FOR POWER SAVING……..  Unified Network Protocol Framework (UNPF)  Low-Energy Adaptive Clustering Hierarchy (LEACH)  MAC PROTOCOL  NETWORK LAYER  BATTERY MODEL and some other…
  • 10. 10 LAYERED ARCHITECTURE  A single powerful base station (BS)  Layers of sensor nodes around BS  Layer i: All nodes i-hop away from BS  Applications:  In-building: BS is an access point  Military  Short-distance, low power tt tx
  • 11. 11 UNIFIED NETWORK PROTOCOL FRAMEWORK (UNPF)  A layered architecture  A set of protocols  Integrates three operations:  Network Initialization & Maintenance Protocol  MAC Protocol  Routing Protocol
  • 12. 12 UNIFIED NETWORK PROTOCOL FRAMEWORK (UNPF)  Network Initialization & Maintenance Protocol:  BS broadcasts its ID using CDMA common control channel (BS reaches all nodes in one hop)  Nodes record BS ID & send beacon signal with their own IDs at their low default power levels  All nodes the BS can hear are at 1-hop distance  The BS broadcasts a control packet with all layer one node IDs  All nodes send a beacon signal again  The layer one nodes record the IDs they hear-layer 2  The layer one nodes inform the BS of the layer 2  The BS broadcasts the layer2 nodes IDs,…  To maintain: periodic beaconing updates are required
  • 13. 13 POWER SAVING MODE  Turning the transceiver off may not always be efficient. Operation in a power-saving mode is energy-efficient only if the time spent in that mode is greater than a certain threshold MULTIPLE HOPS  Using several short hops may be more energy efficient than using one large hop.
  • 14. 14 CLUSTERED ARCHITECTURE  A clustered architecture organizes the sensor nodes into clusters, each governed by a cluster-head. The nodes in each cluster are involved in message exchanges with their cluster-heads, and these heads send message to a BS.  Clustered architecture is useful for sensor networks because of its inherent suitability for data fusion. The data gathered by all member of the cluster can be fused at the cluster-head, and only the resulting information needs to be communicated to the BS.  The cluster formation and election of cluster-heads must be an autonomous, distributed process.
  • 16. 16 LOW-ENERGY ADAPTIVE CLUSTERING HIERARCHY (LEACH)  Self-organizing and adaptive clustering protocol  Evenly distributes the energy expenditure among the sensors  Performs data aggregation where cluster heads act as aggregation points  Two main phases:  Setup phase: organizing the clusters  Steady-state phase: deals with the actual data transfers to the BS
  • 17. 17  Setup phase:  Each sensor chooses a random number m between 0 and 1  If m < T(n) for node n, the node becomes a cluster-head where  P : the desired percentage of cluster heads  r : the round number  G : the set of nodes that have not been cluster heads during the last 1 / P rounds  A cluster head advertises its neighbors using a CSMA MAC.  Surrounding nodes decide which cluster to join based on the signal strength of these messages  Cluster heads assign a TDMA schedule for their members 1 [ * mod(1/ )]( ) 0 , P if n G P r PT n otherwise      
  • 18. 18  Steady-state phase:  All source nodes send their data to their cluster heads  Cluster heads perform data aggregation/fusion through local transmission  Cluster heads send them back to the BS using a single direct transmission  After a certain period of time, cluster heads are selected again through the set-up phase
  • 19. 19 LOW-ENERGY ADAPTIVE CLUSTERING HIERARCHY (LEACH)  Merits:  Accounting for adaptive clusters and rotating cluster heads  Opportunity to implement any aggregation function at the cluster heads  Demerits:  Highly dynamic environments  Continuous updates  Mobility
  • 20. 20 MAC PROTOCOL  During the data transmission phase, the distributed TDMA receiver oriented channel (DTROC) assignment MAC protocol is used.  Two steps of DTROC :  Channel allocation : Each node is assigned a reception channel by the BS, and channel reuse is such that collisions are avoided.  Channel scheduling : The node schedules transmission slots for all its neighbors and broadcasts the schedule. This enables collision-free transmission and saves energy, as nodes can turn off when they are not involved on a send/receive operation.
  • 21. THERE ARE THREE TYPES OF MAC PROTOCOLS  Fixed-allocation  Demand-based  Contention-based 21
  • 22. 22  Fixed-allocation MAC protocol  Share the common medium through a predetermined assignment.  It is suitable for sensor network that continuously monitor and generate deterministic data traffic  Provide a bounded delay for each node  However, in the case of bursty traffic, where the channel requirements of each node may vary over time, it may lead to inefficient usage of the channel.
  • 23. 23  Demand-based MAC protocol  Used in such cases, where the channel is allocated according to the demand of the node  Variable rate traffic can be efficiently transmitted  Require the additional overhead of a reservation process  Contention-based MAC protocol  Random-access-based contention for the channel when packets need to be transmitted  Suitable for bursty traffic  Collisions and no delay guarantees, are not suitable for delay- sensitive or real-time traffic
  • 24. 24 HYBRID TDMA/FDMA  A pure TDMA scheme minimize the time for which a node has to be kept on, but the associated time synchronization cost are very high.  A pure FDMA scheme allots the minimum required bandwidth for each connection  If the transmitter consumes more power, a TDMA scheme is favored, since it can be switch off in idle slots to save power.  If the receiver consumes greater power, a FDMA scheme is favored, because the receiver need not expend power for time synchronization.
  • 26. APPLICATIONS OF LPWSN  Area monitoring  Health care monitoring  Air pollution monitoring  Forest fire detection  Landslide detection  Water quality monitoring  Natural disaster prevention  Industrial monitoring 26
  • 27. 27  Facility management  Intrusion detection into industrial sites  Control of leakages in chemical plants, …  Machine surveillance and preventive maintenance  Embed sensing/control functions into places no cable has gone before  E.g., tire pressure monitoring  Precision agriculture  Bring out fertilizer/pesticides/irrigation only where needed  Medicine and health care  Post-operative or intensive care  Long-term surveillance of chronically ill patients or the elderly
  • 28. CHALLENGES  Hardware : 1. Low cost 2. Tiny sensors 3. Lifetime maximization 4. Robustness and fault tolerance 5. Self-configuration  Software : 1. Operating systems 2. Security 3. Mobility 28
  • 29. ADVANTAGES OF A WSN  Avoids a lot of wiring  Can accommodate new devices at any time  Flexible to go through physical partitions  It can be accessed through a centralized monitor  Infrastructure 29
  • 30. DISADVANTAGES OF WSN  Easy for hackers to hack a network  Comparatively low speed of communication  Gets distracted by various elements  Costly at large  Life of nodes  Energy life 30
  • 31. FUTURE SCOPE  More research work needs to be done in future.  Needs to be implemented in a wireless sensor network with mobile nodes.  The effects of very large node densities need to be investigated.  The feasibility of using the clustering technique and data aggregation needs to be tested in the same wireless sensor network. 31
  • 33. 33 FUTURE OF WSN SMART HOME / SMART OFFICE  Sensors controlling appliances and electrical devices in the house.  Better lighting and heating in office buildings.  The Pentagon building has used sensors extensively.
  • 34. FUTURE SCOPE 34 Intelligent transport, industry and society, smart utilities Connected Consumer Electronics  Development of a TDMA/CSMA hybrid MAC  TinyOS currently has a CSMA MAC  Hope to improve throughput by employing TDMA  Time is divided into transmission periods and contention perio  Nodes will contend with each other to join “the transmission group” during the contention period.  Nodes in the transmission group will be allocated a time-slot in the transmission period.  Development of data storage engine optimized for fast retrieval
  • 35. CONCLUSION This presentation shows all the techniques that are used for wireless sensor network for low power consumption , for example MAC protocol, LEACH, Network layer, ect. Most of the research on energy efficient controlled access protocol has come at a cost of control packets overhead. By investigating this research area further, an enhanced energy efficiency protocol may be developed that can revolutionise WSN’s power consumption. There are some another protocols which can be used for less energy consumption like CDMA,FDMA,TDMA. 35
  • 37. 37